Professional Documents
Culture Documents
Zig Bee Info
Zig Bee Info
4 Summary
Sinem Coleri Ergen
Email: csinem@eecs.berkeley.edu
September 10, 2004
Abstract
This document gives the motivation for the ZigBee alliance and explains the physical, medium
access and routing layers of ZigBee.
Contents
1 Introduction
1.1 Evolution of LR-WPAN Standardization . . . . . . . . . . . . . . . . . . . . . . .
1.2 ZigBee and IEEE 802.15.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 ZigBee vs. Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
2
2
3
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4
4
4
4
4
5
5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
8
8
8
9
.
.
.
.
.
.
.
.
.
.
10
10
11
12
14
15
16
17
19
20
21
.
.
.
.
26
26
28
28
29
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Chapter 1
Introduction
1.1 Evolution of LR-WPAN Standardization
The cellular network was a natural extension of the wired telephony network that became pervasive
during the mid-20th century. As the need for mobility and the cost of laying new wires increased,
the motivation for a personal connection independent of location to that network also increased.
Coverage of large area is provided through (1-2km) cells that cooperate with their neighbors to
create a seemingly seamless network. Examples of standards are GSM, IS-136, IS-95. Cellular
standards basically aimed at facilitating voice communications throughout a metropolitan area.
During the mid-1980s, it turned out that an even smaller coverage area is needed for higher user
densities and the emergent data traffic. The IEEE 802.11 working group for WLANs is formed to
create a wireless local area network standard.
Whereas IEEE 802.11 was concerned with features such as Ethernet matching speed, longrange( 100m), complexity to handle seamless roaming, message forwarding, and data throughput
of 2-11Mbps, WPANs are focused on a space around a person or object that typically extends
up to 10m in all directions. The focus of WPANs is low-cost, low power, short range and very
small size. The IEEE 802.15 working group is formed to create WPAN standard. This group
has currently defined three classes of WPANs that are differentiated by data rate, battery drain
and quality of service(QoS). The high data rate WPAN(IEEE 802.15.3) is suitable for multi-media
applications that require very high QoS. Medium rate WPANs (IEEE 802.15.1/Blueetooth) will
handle a variety of tasks ranging from cell phones to PDA communications and have QoS suitable
for voice communications. The low rate WPANs(IEEE 802.15.4/LR-WPAN) is intended to serve
a set of industrial, residential and medical applications with very low power consumption and cost
requirement not considered by the above WPANs and with relaxed needs for data rate and QoS. The
low data rate enables the LR-WPAN to consume very little power.
than is possible with Bluetooth. ZigBee compliant wireless devices are expected to transmit 10-75
meters, depending on the RF environment and the power output consumption required for a given
application, and will operate in the unlicensed RF worldwide(2.4GHz global, 915MHz Americas or
868 MHz Europe). The data rate is 250kbps at 2.4GHz, 40kbps at 915MHz and 20kbps at 868MHz.
IEEE and ZigBee Alliance have been working closely to specify the entire protocol stack. IEEE
802.15.4 focuses on the specification of the lower two layers of the protocol(physical and data link
layer). On the other hand, ZigBee Alliance aims to provide the upper layers of the protocol stack
(from network to the application layer) for interoperable data networking, security services and a
range of wireless home and building control solutions, provide interoperability compliance testing,
marketing of the standard, advanced engineering for the evolution of the standard. This will assure
consumers to buy products from different manufacturers with confidence that the products will work
together.
IEEE 802.15.4 is now detailing the specification of PHY and MAC by offering building blocks
for different types of networking known as star, mesh, and cluster tree. Network routing
schemes are designed to ensure power conservation, and low latency through guaranteed time
slots. A unique feature of ZigBee network layer is communication redundancy eliminating single
point of failure in mesh networks. Key features of PHY include energy and link quality detection,
clear channel assessment for improved coexistence with other wireless networks.
Chapter 2
2.2.1
Star Topology
In the star topology, the communication is established between devices and a single central controller, called the PAN coordinator. The PAN coordinator may be mains powered while the devices
will most likely be battery powered. Applications that benefit from this topology include home
automation, personal computer (PC) peripherals, toys and games.
After an FFD is activated for the first time, it may establish its own network and become the
PAN coordinator. Each start network chooses a PAN identifier, which is not currently used by
any other network within the radio sphere of influence. This allows each star network to operate
independently.
2.2.2
Peer-to-peer Topology
In peer-to-peer topology, there is also one PAN coordinator. In contrast to star topology, any device
can communicate with any other device as long as they are in range of one another. A peer-to-peer
2.2.3
Cluster-tree Topology
Cluster-tree network is a special case of a peer-to-peer network in which most devices are FFDs and
an RFD may connect to a cluster-tree network as a leave node at the end of a branch. Any of the
FFD can act as a coordinator and provide synchronization services to other devices and coordinators.
Only one of these coordinators however is the PAN coordinator.
The PAN coordinator forms the first cluster by establishing itself as the cluster head (CLH)
with a cluster identifier (CID) of zero, choosing an unused PAN identifier, and broadcasting beacon
frames to neighboring devices. A candidate device receiving a beacon frame may request to join
the network at the CLH. If the PAN coordinator permits the device to join, it will add this new
device as a child device in its neighbor list. The newly joined device will add the CLH as its parent
in its neighbor list and begin transmitting periodic beacons such that other candidate devices may
then join the network at that device. Once application or network requirements are met, the PAN
coordinator may instruct a device to become the CLH of a new cluster adjacent to the first one. The
advantage of this clustered structure is the increased coverage area at the cost of increased message
latency.
Chapter 3
Chapter 4
boundary of the next backoff period. In unslotted CSMA-CA, the backoff periods of one device do
not need to be synchronized to the backoff periods of another device.
Each device has 3 variables: NB, CW and BE. NB is the number of times the CSMA-CA
algorithm was required to backoff while attempting the current transmission. It is initialized to 0
before every new transmission. CW is the contention window length, which defines the number of
backoff periods that need to be clear of activity before the transmission can start. It is initialized
to 2 before each transmission attempt and reset to 2 each time the channel is assessed to be busy.
CW is only used for slotted CSMA-CA. BE is the backoff exponent, which is related to how many
backoff periods a device shall wait before attempting to assess the channel. Although the receiver
of the device is enabled during the channel assessment portion of this algorithm, the device shall
discard any frames received during this time.
In slotted CSMA-CA, NB, CW and BE are initialized and the boundary of the next backoff
period is located. In unslotted CSMA-CA, NB and BE are initialized (step1). The MAC layer
shall delay for a random number of complete backoff periods in the range 0 to 2BE 1 (step 2)
then request that PHY performs a CCA (clear channel assessment) (step 3). The MAC sublayer
shall then proceed if the remaining CSMA-CA algorithm steps, the frame transmission, and any
acknowledgement can be completed before the end of the CAP. If the MAC sublayer cannot proceed,
it shall wait until the start of the CAP in the next superframe and repeat the evaluation.
If the channel is assessed to be busy (step 4), the MAC sublayer shall increment both NB and
BE by one, ensuring that BE shall be no more than aMaxBE. In slotted CSMA-CA, CW can also be
reset to 2. If the value of NB is less than or equal to macMaxCSMABackoffs, the CSMA-CA shall
return to step 2, else the CSMA-CA shall terminate with a Channel Access Failure status.
If the channel is assessed to be idle (step 5), in a slotted CSMA-CA, the MAC sublayer shall
ensure that contention window is expired before starting transmission. For this, the MAC sublayer
first decrements CW by one. If CW is not equal to 0, go to step 3 else start transmission on the
boundary of the next backoff period. In the unslotted CSMA-CA, the MAC sublayer start transmission immediately if the channel is assessed to be idle. The whole CSMA-CA algorithm is illustrated
in Figure 4.2.
12
13
15
16
4.7 Synchronization
For PANs supporting beacons, synchronization is performed by receiving and decoding beacon
frames. For PANs not supporting beacons, the synchronization is performed by polling the coordinator for data.
In a beacon enabled network, devices shall be permitted to acquire synchronization only with
beacons containing the PAN identifier specified in macPANId. If tracking is specified in the MLMESYNC.request primitive, the device shall attempt to acquire the beacon and keep track of it by
regular and timely activation of its receiver. It shall enable its receiver at a time prior to the next
expected beacon frame transmission, i.e. just before the known start of the next superframe. If
tracking is not specified, the device shall attempt to acquire the beacon only once.
17
18
If a coordinator receives the orphan notification command, it searches its device list for the device sending the command. If the coordinator finds a record of the device, it shall send a coordinator
realignment command to the orphaned device. Otherwise, it shall ignore the packet. The orphan
scan terminates when the device receives a coordinator realignment command or the specified set
of logical channels has been scanned.
19
20
This GTS descriptor shall remain in the beacon frame for aGTSPersistenceTime superframes.
On receipt of the beacon frame, the device shall process the descriptor and notify the next upper
layer of the success.
In the same way, a device is instructed to request the deallocation of an existing GTS through
the GTS request command using the characteristics of the GTS it wishes to deallocate. From this
point on, the GTS to be deallocated shall not be used by the device. Then an ack from the PAN
coordinator to the device. The PAN coordinator then deallocates the request of the GTS characteristics in the packet matches those in its allocation. The PAN coordinator shall also ensure that any
gaps occurring in the CFP, appearing due to the deallocation of a GTS, are removed to maximize
the length of the CAP.
The MLME of the PAN coordinator shall also attempt to detect when a device has stopped using
a GTS using the following rules: For a transmit frame GTS, the MLME of the PAN coordinator
shall assume that the device is no longer using the GTS if a data frame is not received for at least
2 n superframes. For receive GTSs, the MLME of the PAN coordinator shall assume that the
device is no longer using its GTS if an acknowledgement frame is not received for at least 2 n
superframes. The value of n is equal to 28macBeaconOrder if 0 macBeaconOrder 8 and 1 if
9 macBeaconOrder 14.
21
22
23
24
25
Chapter 5
27
next hop on the path from source to the destination becomes unreachable (hello messages are not
received for a certain time, hello messages also ensures that only nodes with bidirectional connectivity are considered to be neighbors, therefore each hello message included the nodes from which
the node has heard), the node upstream of the break propagates an unsolicited RREP with a fresh
sequence number and hop count of to all active upstream nodes. This process continues until all
active source nodes are notified. Upon receiving the notification of a broken link, the source nodes
can restart the discovery process if they still require a route to the destination. If it decides that it
would like to rebuild the route to the destination, it sends out an RREQ with a destination sequence
number of one greater than the previously known sequence number, to ensure that it builds a new,
viable route and that no nodes reply if they still regard the previous route as valid.
5.2.1
The cluster formation process begins with cluster head selection. After a cluster head is selected ,
the cluster head expands links with other member nodes to form a cluster.
After a node turns on, it scans the channels to search for a HELLO message form other nodes
(HELLO messages correspond to beacons in MAC layer of IEEE 802.15.4). If it cant get any
HELLO messages for a certain time, then it turns to a cluster head as shown in Figure 5.2 and sends
out HELLO messages to its neighbors. The new cluster head wait for responses from neighbors for a
while. If it hasnt received any connection requests, it turns back to a regular node and listens again.
The cluster head can also be selected based on stored parameters of each node, like transmission
range, power capacity, computing ability or location information.
After becoming the cluster head (CH), the node broadcasts a periodic HELLO message that
contains a part of the cluster head MAC address and node ID 0 that indicates the cluster head. The
nodes that receive this message send a CONNECTION REQUEST message to the cluster head.
When the CH receives it, it responds to the node with a CONNECTION RESPONSE message that
contains a node ID for the node (node ID corresponds to the short address at the MAC layer). The
node that is assigned a node ID replies with an ACK message to the cluster head. The message
exchange is shown in Figure 5.3.
If all nodes are located in the range of the cluster head, the topology of connection becomes a
star and every member nodes are connected to the cluster head with one hop. A cluster can expand
into a multi-hop structure when each node supports multiple connections. The message exchange
for the multihop cluster set up procedure is shown in Figure 5.4.
If the cluster head has run out of all node IDs or the cluster has reached some other defined
limit, it should reject connection requests from new nodes. The rejection is through the assignment
of a special ID to the node.
The entry of the neighbor list and the routes is updated by the periodic HELLO message. If a
node entry does not update until a certain timeout limit, it should be eliminated.
28
5.2.2
Multi-Cluster Network
To form a network, a Designated Device (DD) is needed. The DD has responsibility to assign a
unique cluster ID to each cluster head. This cluster ID combined with the node ID that the CH
assigns to each node within a cluster forms a logical address and is used to route packets. Another
role of the DD is to calculate the shortest route from the cluster to the DD and inform it to all nodes
within the network.
When the DD joins the network, it acts as the CH of cluster 0 and starts to send HELLO message
to the neighborhood. If a CH has received this message, it sends a CONNECTION REQUEST
message and joins the cluster 0. After that, the CH requests a CID to the DD. In this case, the CH is
29
30
31
32
33
34
Bibliography
[1] ZigBee Alliance, http://www.caba.org/standard/zigbee.html.
[2] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless LAN medium access control(MAC) and physical layer(PHY) specification, IEEE, New York, NY, USA, IEEE
Std 802.11-1997 edition, 1997
[3] LAN-MAN Standards Committee of the IEEE Computer Society, Wireless Medium Access
Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area
Networks (LR-WPANs), IEEE, 2003
[4] C. E. Perkins and E. M. Royer, Ad Hoc On Demand Distance Vector Routing
[5] IEEE P802.15 Working Group for WPANs, Cluster Tree Network, April 2001
35